EAPA: An efficient authentication protocol against pollution attack for smart grid

被引:9
作者
Wen, Mi [1 ]
Lei, Jingsheng [1 ]
Bi, Zhongqin [1 ]
Li, Jing [1 ]
机构
[1] Shanghai Univ Elect Power, Coll Comp Sci & Technol, Shanghai, Peoples R China
基金
中国国家自然科学基金;
关键词
Smart grid; Authentication; Pollution attack; Replay attack; DATA INJECTION; NETWORK; SCHEME; DEFENSE;
D O I
10.1007/s12083-014-0283-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development of smart grid depends on increased deployment of two-way communication to improve its efficiency and reliability of power delivery. However, this additional dependency also expands the risk from pollution attacks, which consist of injecting malicious packets in the network. The pollution attacks are amplified by the network coding process, resulting in a greater damage to the state estimation and decision making. In this paper, we address this issue by designing an efficient authentication protocol, named EAPA, for the smart grid communication. The proposed scheme allows not only recipient nodes, but also intermediate nodes, to verify the integrity and origin of the packets received without having to decode, and thus detect and discard the malicious packets in transit that fail the verification. By this means, the pollution is canceled out before reaching the destinations. Security analysis demonstrates that the EAPA can be resilient to data/tag pollution attacks and replay attacks. Performance evaluation results show that our EAPA can reduce much more communication overhead than Wu's scheme.
引用
收藏
页码:1082 / 1089
页数:8
相关论文
共 26 条
  • [1] Abur A., 2004, Power System State Estimation: Theory and Implementation
  • [2] Homomorphic MACs: MAC-Based Integrity for Network Coding
    Agrawal, Shweta
    Boneh, Dan
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, 2009, 5536 : 292 - +
  • [3] Anh L., 2011, Network Coding (NetCod), 2011 International Symposium on, P1
  • [4] Blake I., 2005, London Mathematical Society Lecture Note Series
  • [5] Boneh D, 2009, LECT NOTES COMPUT SC, V5443, P68
  • [6] Esmalifalak M., 2012, 2012 IEEE Wireless Communications and Networking Conference (WCNC), P2468, DOI 10.1109/WCNC.2012.6214211
  • [7] Bad Data Injection in Smart Grid: Attack and Defense Mechanisms
    Huang, Yi
    Esmalifalak, Mohammad
    Huy Nguyen
    Zheng, Rong
    Han, Zhu
    Li, Husheng
    Song, Lingyang
    [J]. IEEE COMMUNICATIONS MAGAZINE, 2013, 51 (01) : 27 - 33
  • [8] Resilient network coding in the presence of Byzantine adversaries
    Jaggi, Sidharth
    Langberg, Michael
    Katti, Sachin
    Ho, Tracey
    Katabi, Dina
    Medard, Muriel
    Effros, Michelle
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) : 2596 - 2603
  • [9] An efficient dynamic-identity based signature scheme for secure network coding
    Jiang, Yixin
    Zhu, Haojin
    Shi, Minghui
    Shen, Xuemin
    Lin, Chuang
    [J]. COMPUTER NETWORKS, 2010, 54 (01) : 28 - 40
  • [10] Coding for errors and erasures in random network coding
    Koetter, Ralf
    Kschischang, Frank R.
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (08) : 3579 - 3591